| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | story making the rounds |
-> That's frightening you goy going on! :( -> If it were me, I'd haul out the HDD, For a day I did. Other precautions have been adaquate however. As I'm currently running a Linux live CD in RAM booted CD-ROM my hard drives are not mounted in the O.S. so no reads or writes to them occur. -> unplug the BIOS battery(for 48 -> hours, to totally drain the BIOS Won't work. While the BIOS and CMOS are intimately related they are not one and the same thing. The BIOS resides in NVRAM ( non-volitile memory) that does not lose it's settings in powerdown. The CMOS is where cerain _settings_ used by the BIOS are stored and that nenory does require power to retain settings. -> in case the malware stashed a copy of -> itself in the boot run proggies) then start fresh and just avoid -> everything you'd been doing the week before getting infucted! :( I had at least a ten year run without this sort of nonsense so I my time was due. I will make some changes in protocols however no pain no gain applies so I'll endure some risk for benefit. At least I'm learning and adding some tools to my arsenal against this sort of crud. -> Sucks. -> Good luck in recovery! Thanks, well over halfway there. Data recovery from the still somewhat affected system requires I take some time before completing my housecleaning. --- Platinum Xpress/Win/WINServer v3.0pr5* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140) SEEN-BY: 633/267 270 5030/786 @PATH: 123/140 500 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.